On 02/26/2018 11:20 AM, Viktor Dukhovni wrote:
>
>> On Feb 26, 2018, at 9:26 AM, Paul Wouters <p...@nohats.ca> wrote:
>>
>> So it was decided to not use a full DNS packet format? And then since you
>> miss the structure of the Answer Section and Additional/Authority
>> Section, you require the "answer RR's" come first where you basically
>> emulate an Answer Section?
>>
>> Isn't that an indication that we should really use the wireformat of an
>> entire DNS message here? Maybe some DNS library/tools people can chime
>> in here to tell us if this matters much to them (assuming they are
>> adding support for creating/consuming these chains of RRsets in wire
>> format.
>>
>> I am personally a little sad we cannot have a dig +chainquery command
>> where we write out the entire answer packet format to a blob, to be loaded by
>> the TLS server. And where a TLS client cannot just hand over the blob
>> "as if it came in as a reply from a DNS server" to its DNS/cache
>> receiving code path.
> The latter would require compression support on the receiving side, which
> has been specifically excluded so far.  I am not against making the data
> more compact, though it is rather late in the process, but I have a more
> pressing issue.
>
> I think that as it stands, lack of authenticated denial of existence is
> a *fatal* flaw in the protocol.  I just don't see a sufficiently practical
> scenario in which this extension confers a useful security benefit.

It of course would not be a fatal flaw if the document was targeting
Experimental status, but I do not have the sense that the authors wish
to make that switch.

> Perhaps this draft should go back to the working group, to consider a new
> protocol element, by which the server commits to support the extension for
> a time that is substantially longer than the underlying DNS TTLs.  During
> this time (suggested to be weeks or months, when in production after initial
> testing), the server MUST support the extension and respond with EITHER a
> valid TLSA RRset chain, or with a valid denial of existence.
>
> The protocol, thus extended, can then be seen as a more robust form of key
> pinning, in which pins are stored server-side, and only the fact that
> pinning is expected is stored client-side (for any length of time, the
> client may still do short-term caching of TLSA RRs based on the DNS TTL).

There doesn't seem to be much interest in pinning-like schemes for TLS
at this point (see also the "TLS server identity pinning" proposal from
the SAAG/secdispatch session at IETF 100).
And I do think the lack of authenticated denial of existence is
something the WG was aware of during our earlier discussions, so it's
unclear that there is a need to hold things up for this issue.

-Benjamin

> The protocol is still subject to downgrade (to PKIX) on first contact,
> but is this a common element of all protocols that bootstrap security
> on first use.  Indeed the WebPKI itself is largely TOFU as most certs
> (which are predominantly DV certs) are issued by CAs based on rather
> weak initial evidence.
>

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to